<delect id="pnrdb"><rp id="pnrdb"><b id="pnrdb"></b></rp></delect>

    <thead id="pnrdb"><delect id="pnrdb"><output id="pnrdb"></output></delect></thead>

    <sub id="pnrdb"><listing id="pnrdb"><ins id="pnrdb"></ins></listing></sub>
    <address id="pnrdb"><var id="pnrdb"></var></address>
    <address id="pnrdb"><dfn id="pnrdb"></dfn></address>
    <sub id="pnrdb"></sub>

        <address id="pnrdb"></address>
      <thead id="pnrdb"><var id="pnrdb"><ruby id="pnrdb"></ruby></var></thead>

      <sub id="pnrdb"><dfn id="pnrdb"><ins id="pnrdb"></ins></dfn></sub>



      What to do When You've Been Hacked 

      You've received the ominous message that your account has been compromised. Now what?

      June 8, 2017

      Message: We have detected unusual activity on your account. Did you authorize this transaction?

      At first you think the text from your credit card company is a mistake; then reality sets in. You may have been hacked. Your mind reels as you wonder what information the thieves were able to access and if your identity has been stolen. Sadly, this scenario is all too common. The Federal Trade Commission reports that 11.7 million people find themselves as victims of identity theft every year.

      Cyberattacks target individuals and huge corporations alike. While reputable companies take cyber threats seriously and institute multiple layers of protection, hackers relentlessly pursue ways around obstacles between them and your information. Should you get hacked, take action immediately. 

      Step 1: Contact

      Contact your financial institutions. Alert them and order new credit and debit cards. Inform the three major credit bureaus about the breach, and ask for credit monitoring, fraud alerts, as well as copies of your credit reports.

      Equifax.com // 800.685.1111
      Transunion.com // 800.916.8800
      Experian.com // 888.397.3742

      Step 2: Report

      Report identity theft, by phone and in writing, to local, state and federal law enforcement. Keep records of all relevant correspondence. Contact the Federal Trade Commission as well for next steps.

      Identitytheft.com // 877.438.4338

      Step 3: Reset

      Reset passwords. Use a complex and unique mix of numbers, cases and symbols for every website you use. Experts blame weak or stolen user names and passwords for 76% of data breaches. Consider using password manager software if needed. If the website offers two-step authentication, use it.

      Step 4: Check

      Routinely check for fraudulent activity. Watch your monthly statements, emails and regular mail and report unauthorized or suspicious activity immediately.

      Step 5: Notify

      Notify your contact list to delete strange emails that appear to be from you.

      Step 6: Secure

      Secure your information by keeping software up to date and installing an antivirus product. Be thoughtful about information shared online or via telephone. Shred sensitive material or store securely in a digital or physical vault.

      Step 7: Defend

      Stay alert. Vigilance and careful behavior online (e.g., using secure sites denoted by https in the URL) offer a strong line of defense against hacking.